<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-guo-sidrops-rpa-profile-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Route Path Authorizations">A Profile for Route Path Authorizations (RPAs)</title>
    <seriesInfo name="Internet-Draft" value="draft-guo-sidrops-rpa-profile-01"/>
    <author fullname="Yangfei Guo">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>guoyangfei@zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Xiaoliang Wang">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangxiaoliang0623@foxmail.com</email>
      </address>
    </author>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="December" day="07"/>
    <abstract>
      <?line 89?>

<t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Route Path Authorizations (RPA) objects used in Resource Public Key Infrastructure (RPKI). An RPA is a digitally signed object that provides a means of verifying whether an IP address block is received from <tt>AS a</tt> to <tt>AS b</tt> and announced from <tt>AS b</tt> to <tt>AS c</tt>. When validated, an RPA's eContent can be used for the detection and mitigation of route hijacking, especially providing protection for the AS_PATH attribute in BGP-UPDATE. This object is a variant of the aut-num object in the Internet Routing Registry (IRR).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://fcbgp.github.io/rpki-rpa-profile/draft-guo-sidrops-rpa-profile.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-guo-sidrops-rpa-profile/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/FCBGP/rpa-profile"/>.</t>
    </note>
  </front>
  <middle>
    <?line 93?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Border Gateway Protocol (BGP) <xref target="RFC4271"/> was designed with no mechanisms to validate the security of BGP attributes. There are two types of BGP security issues, BGP Hijacks and BGP Route Leaks <xref target="RFC7908"/>, that plague Internet security.</t>
      <t>The primary purpose of the Resource Public Key Infrastructure (RPKI) is to improve route security.  (See <xref target="RFC6480"/> for more information.) As part of this system, a mechanism is needed to allow entities to verify that an IP address holder has permitted an AS to advertise a route along the propagation path. A Route Path Authorization (RPA) provides this function.</t>
      <t>An RPA is a digitally signed object through which the issuer (the holder of an Autonomous System identifier) can authorize one or more other Autonomous Systems (ASes) as its upstream ASes or one or more other ASes as its downstream ASes. The upstream ASes, or previous ASes, mean that the issuer AS can receive BGP route updates from these ASes. The downstream ASes, or next ASes, mean that the issuer AS would advertise the BGP route to these ASes.</t>
      <t>This propagation model uses a Web of Trust, i.e., the issuer AS trusts its upstream ASes and authorizes its downstream ASes to propagate its received routes. Then, all downstream ASes would also accept the routes and proceed to send them to their next hops. The relationship among them is the signed RPA, which attests that a downstream AS has been selected by the directly linked upstream AS to announce the routes. This introduces an ingress policy.</t>
      <t>Initially, all ASes on the propagation path should sign one or more RPAs independently if they want to propagate the route to their downstream ASes, and then be able to detect and filter malicious routes (e.g., route leaks and route hijacks). In addition, the RPA can also attest that all ASes on a propagation path have received and selected this AS_PATH, which can be certified as a trusted path.</t>
      <t>The RPA uses the template for RPKI digitally signed objects <xref target="RFC6488"/> for the definition of a Cryptographic Message Syntax (CMS) <xref target="RFC5652"/> wrapper for the RPA content as well as a generic validation procedure for RPKI signed objects.  As RPKI certificates issued by the current infrastructure are required to validate RPA, we assume the mandatory-to-implement algorithms in <xref target="RFC6485"/> or its successor.</t>
      <t>To complete the specification of the RPA (see <xref section="4" sectionFormat="of" target="RFC6488"/>), this document defines:</t>
      <ol spacing="normal" type="1"><li>
          <t>The object identifier (OID) that identifies the RPA-signed object. This OID appears in the eContentType field of the encapContentInfo object as well as the content-type signed attribute within the signerInfo structure.</t>
        </li>
        <li>
          <t>The ASN.1 syntax for the RPA content, which is the payload signed by the BGP speaker. The RPA content is encoded using the ASN.1 <xref target="X.680"/> Distinguished Encoding Rules (DER) <xref target="X.690"/>.</t>
        </li>
        <li>
          <t>The steps required to validate an RPA beyond the validation steps specified in <xref target="RFC6488"/>.</t>
        </li>
      </ol>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="the-rpa-content-type">
      <name>The RPA Content-Type</name>
      <t>The content-type for an RPA is defined as RoutePathAuthorization and has the numerical value of 1.2.840.113549.1.9.16.1.(TBD).</t>
      <t>This OID <bcp14>MUST</bcp14> appear both within the eContentType in the encapContentInfo object as well as the content-type signed attribute in the signerInfo object (see <xref target="RFC6488"/>).</t>
    </section>
    <section anchor="The-RPA-eContent">
      <name>The RPA eContent</name>
      <t>The content of an RPA identifies feasible AS's route paths. Upon receiving a BGP-UPDATE message, other ASes can perform AS-path verification according to the validated RPAs. An RPA is an instance of RoutePathAuthorization, formally defined by the following ASN.1 <xref target="X.680"/> module:</t>
      <artwork><![CDATA[
RPKI-RPA-2025
  { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
     pkcs-9(9) smime(16) modules(0) id-mod-rpki-RPA-2025(TBD) }

DEFINITIONS EXPLICIT TAGS ::=
BEGIN

IMPORTS
  CONTENT-TYPE
  FROM CryptographicMessageSyntax-2010 -- RFC 6268
    { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
      pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) } ;

  IPAddressFamily
  FROM IPAddrAndASCertExtn -- In [RFC3779]
    { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) mod(0) id-mod-ip-addr-and-as-ident(30) } ;

id-ct-RPA OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840)
    rsadsi(113549) pkcs(1) pkcs-9(9) id-smime(16) id-ct(1) rpa(TDB) }

ct-RPA CONTENT-TYPE ::=
    { TYPE RoutePathAuthorization IDENTIFIED BY id-ct-RPA }

RoutePathAuthorization ::= SEQUENCE {
    version [0]         INTEGER DEFAULT 0,
    asID                ASID,
    routePathBlocks     SEQUENCE (SIZE(1..MAX)) OF RoutePathDescription }

RoutePathDescription ::= SEQUENCE {
    previousASes        SEQUENCE (SIZE(0..MAX)) OF ASID,
    nextASes            SEQUENCE (SIZE(0..MAX)) OF ASID,
    origins             SEQUENCE (SIZE(0..MAX)) OF ASID OPTIONAL,
    prefixes            SEQUENCE (SIZE(0..MAX)) OF IPAddressFamily OPTIONAL }

ASID ::= INTEGER (0..4294967295)

END
]]></artwork>
      <t>Note that this content appears as the eContent within the encapContentInfo (see <xref target="RFC6488"/>).</t>
      <section anchor="the-version-element">
        <name>The version Element</name>
        <t>The version number of the RoutePathAuthorization entry <bcp14>MUST</bcp14> be 0.</t>
      </section>
      <section anchor="the-asid-element">
        <name>The asID Element</name>
        <t>The asID field contains the AS number of the issuer AS associated with this RPA.</t>
      </section>
      <section anchor="the-routepathblocks-element">
        <name>The routePathBlocks Element</name>
        <t>The routePathBlocks field comprises a list of feasible route paths associated with the issuing asID. Each feasible route path generally includes an upstream AS, a downstream AS, and a set of IP prefix blocks. This field may aggregate route paths that share the same IP prefix blocks to optimize space. Therefore, the routePathBlocks field indicates that for an IP prefix blocks represented by origins or prefixes, the issuing asID can receive routes from any AS in previousASes and subsequently forward them to any AS in nextASes. The origins and prefixes fields both indicate a set of IP prefix blocks. Both of them can be None; in that case, it means all IP prefix blocks can be forwarded according to the feasible route paths.</t>
        <section anchor="the-previousases-element">
          <name>The previousASes Element</name>
          <t>The previousASes field contains the upstream AS Number (ASN) of the issuer AS that can advertise the routes to the issuer AS.</t>
        </section>
        <section anchor="the-nextases-element">
          <name>The nextASes Element</name>
          <t>The nextASes field contains the downstream AS Number (ASN) of the issuer AS that can receive advertised routes from the issuer AS.</t>
        </section>
        <section anchor="the-origins-element">
          <name>The origins Element</name>
          <t>The origins field contains a set of ASes and is associated with Route Origin Authorization (ROA) <xref target="RFC9582"/> or Signed Prefix List (SPL) <xref target="SignedPrefixList"/>. This is an optional field. If populated, it indicates that all routes belonging to the specified origin ASes can be received from the upstream ASes in the previousASes field and advertised to the downstream ASes in the nextASes field.</t>
        </section>
        <section anchor="the-prefixes-element">
          <name>The prefixes Element</name>
          <t>The prefixes field contains IP prefix blocks. It is an optional field. If populated, it indicates that all routes specified can be received from the upstream ASes listed in the previousASes field and advertised to the downstream ASes in the nextASes field.</t>
        </section>
      </section>
    </section>
    <section anchor="rpa-validation">
      <name>RPA Validation</name>
      <t>To validate an RPA, the relying party <bcp14>MUST</bcp14> perform all the validation checks specified in <xref target="RFC6488"/> as well as the following additional RPA-specific validation steps.</t>
      <ul spacing="normal">
        <li>
          <t>The contents of the CMS eContent field <bcp14>MUST</bcp14> conform to all the constraints described in <xref target="The-RPA-eContent"/>.</t>
        </li>
        <li>
          <t>The Autonomous System Identifier Delegation Extension described in <xref target="RFC3779"/> is also used in RPA and <bcp14>MUST</bcp14> be present in the EE certificate contained in the CMS certificates field.</t>
        </li>
        <li>
          <t>The AS identifier in the RoutePathAuthorization eContent 'asID' field <bcp14>MUST</bcp14> be contained in the AS Identifiers in the certificate extension.</t>
        </li>
        <li>
          <t>The Autonomous System Identifier Delegation extension <bcp14>MUST NOT</bcp14> contain "inherit" elements.</t>
        </li>
        <li>
          <t>The IP Address Delegation Extension <xref target="RFC3779"/> is not used in RPA, and <bcp14>MUST NOT</bcp14> be present in the EE certificate.</t>
        </li>
      </ul>
    </section>
    <section anchor="operational-consideration">
      <name>Operational Consideration</name>
      <t>Multiple valid RPA objects that contain the same asID could exist. In such a case, the union of these objects forms the complete route path set of this AS. For a given asID, it is <bcp14>RECOMMENDED</bcp14> that a CA maintains a single RPA object. If an AS holder publishes an RPA object, then relying parties <bcp14>SHOULD</bcp14> assume that this object is complete for that issuer AS.</t>
      <t>If one AS receives a BGP UPDATE message with the issuer AS in the AS_PATH attribute that cannot match any route paths of this issuer AS, it implies that there is an AS-path forgery in this message.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations of <xref target="RFC6480"/>, <xref target="RFC6481"/>, <xref target="RFC6485"/>, <xref target="RFC6487"/> and <xref target="RFC6488"/> also apply to RPAs.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="smi-security-for-smime-module-identifier-registry">
        <name>SMI Security for S/MIME Module Identifier registry</name>
        <t>Please add the id-mod-rpki-rpa-2025 to the SMI Security for S/MIME Module Identifier (1.2.840.113549.1.9.16.0) registry (https://www.iana.org/assignments/smi-numbers/smi-numbers.xml#security-smime-0) as follows:</t>
        <artwork><![CDATA[
Decimal  |  Description                 | Specification
----------------------------------------------------------------
TBD      | id-mod-rpki-rpa-2025          | [RFC-to-be]
]]></artwork>
      </section>
      <section anchor="smi-security-for-smime-cms-content-type-registry">
        <name>SMI Security for S/MIME CMS Content Type registry</name>
        <t>Please add the RPA to the SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1) registry (https://www.iana.org/assignments/smi-numbers/smi-numbers.xml#security-smime-1) as follows:</t>
        <artwork><![CDATA[
Decimal  |  Description                | Specification
----------------------------------------------------------------
TBD      |  id-ct-RPA                   | [RFC-to-be]
]]></artwork>
      </section>
      <section anchor="rpki-signed-object-registry">
        <name>RPKI Signed Object registry</name>
        <t>Please add RPA to the RPKI Signed Object registry (https://www.iana.org/assignments/rpki/rpki.xhtml#signed-objects) as follows:</t>
        <artwork><![CDATA[
Name          | OID                         | Specification
----------------------------------------------------------------
Route Path    |                             |
Authorization | 1.2.840.113549.1.9.16.1.TBD | [RFC-to-be]
]]></artwork>
      </section>
      <section anchor="rpki-repository-name-scheme-registry">
        <name>RPKI Repository Name Scheme registry</name>
        <t>Please add an item for the Route Path Authorization file extension to the "RPKI Repository Name Scheme" registry created by <xref target="RFC6481"/> as follows:</t>
        <artwork><![CDATA[
Filename  |
Extension | RPKI Object                   | Reference
-----------------------------------------------------------------
     .rpa | Route Path Authorization      | [RFC-to-be]
]]></artwork>
      </section>
      <section anchor="media-type-registry">
        <name>Media Type registry</name>
        <t>The IANA is requested to register the media type application/rpki-rpa in the "Media Type" registry as follows:</t>
        <artwork><![CDATA[
  Type name: application
  Subtype name: rpki-rpa
  Required parameters: N/A
  Optional parameters: N/A
  Encoding considerations: binary
  Security considerations: Carries an RPKI RPA [RFC-to-be].
      This media type contains no active content. See
      Section xxx of [RFC-to-be] for further information.
  Interoperability considerations: None
  Published specification: [RFC-to-be]
  Applications that use this media type: RPKI operators
  Additional information:
    Content: This media type is a signed object, as defined
        in [RFC6488], which contains a payload of a list of
        AS identifiers (ASIDs) as defined in [RFC-to-be].
    Magic number(s): None
    File extension(s): .rpa
    Macintosh file type code(s):
  Person & email address to contact for further information:
    Yangfei Guo <guoyangfei@zgclab.edu.cn>
  Intended usage: COMMON
  Restrictions on usage: None
  Change controller: IETF
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3779">
          <front>
            <title>X.509 Extensions for IP Addresses and AS Identifiers</title>
            <author fullname="C. Lynn" initials="C." surname="Lynn"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines two X.509 v3 certificate extensions. The first binds a list of IP address blocks, or prefixes, to the subject of a certificate. The second binds a list of autonomous system identifiers to the subject of a certificate. These extensions may be used to convey the authorization of the subject to use the IP addresses and autonomous system identifiers contained in the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3779"/>
          <seriesInfo name="DOI" value="10.17487/RFC3779"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC6481">
          <front>
            <title>A Profile for Resource Certificate Repository Structure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6481"/>
          <seriesInfo name="DOI" value="10.17487/RFC6481"/>
        </reference>
        <reference anchor="RFC6485">
          <front>
            <title>The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate Revocation Lists, and signed objects as well as for the relying parties (RPs) that verify these digital signatures. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6485"/>
          <seriesInfo name="DOI" value="10.17487/RFC6485"/>
        </reference>
        <reference anchor="RFC6487">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC6488">
          <front>
            <title>Signed Object Template for the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="A. Chi" initials="A." surname="Chi"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a generic profile for signed objects used in the Resource Public Key Infrastructure (RPKI). These RPKI signed objects make use of Cryptographic Message Syntax (CMS) as a standard encapsulation format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6488"/>
          <seriesInfo name="DOI" value="10.17487/RFC6488"/>
        </reference>
        <reference anchor="SignedPrefixList">
          <front>
            <title>A profile for Signed Prefix Lists for Use in the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Geoff Huston" initials="G." surname="Huston">
              <organization>APNIC</organization>
            </author>
            <date day="16" month="September" year="2024"/>
            <abstract>
              <t>   This document defines a "Signed Prefix List", a Cryptographic Message
   Syntax (CMS) protected content type for use with the Resource Public
   Key Infrastructure (RPKI) to carry the complete list of prefixes
   which an Autonomous System (the subject AS) may originate to all or
   any of its routing peers.  The validation of a Signed Prefix List
   confirms that the holder of the subject AS produced the object, and
   that this list is a current, accurate and complete description of
   address prefixes that may be announced into the routing system
   originated by the subject AS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-rpki-prefixlist-04"/>
        </reference>
        <reference anchor="X.680" target="https://itu.int/rec/T-REC-X.680-202102-I/en">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author initials="" surname="ITU-T">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="Recommendation ITU-T X.680" value=""/>
        </reference>
        <reference anchor="X.690" target="[https://itu.int/rec/T-REC-X.680-202102-I/en](https://www.itu.int/rec/T-REC-X.690-202102-I/en)">
          <front>
            <title>Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author initials="" surname="ITU-T">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="Recommendation ITU-T X.690" value=""/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC7908">
          <front>
            <title>Problem Definition and Classification of BGP Route Leaks</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>A systemic vulnerability of the Border Gateway Protocol routing system, known as "route leaks", has received significant attention in recent years. Frequent incidents that result in significant disruptions to Internet routing are labeled route leaks, but to date a common definition of the term has been lacking. This document provides a working definition of route leaks while keeping in mind the real occurrences that have received significant attention. Further, this document attempts to enumerate (though not exhaustively) different types of route leaks based on observed events on the Internet. The aim is to provide a taxonomy that covers several forms of route leaks that have been observed and are of concern to the Internet user community as well as the network operator community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7908"/>
          <seriesInfo name="DOI" value="10.17487/RFC7908"/>
        </reference>
        <reference anchor="RFC9582">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9582"/>
          <seriesInfo name="DOI" value="10.17487/RFC9582"/>
        </reference>
      </references>
    </references>
    <?line 306?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Tobias Fiebig, Kotikalapudi Sriram, Jeffery Hass, and Alexander Azimov for their valuable comments and suggestions.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
